{"title":"Looking for digital evidence in Windows","authors":"F. Mirza","doi":"10.1109/ISBAST.2008.4547659","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547659","url":null,"abstract":"Digital evidence investigation is concerned with techniques of acquisition and analysis of data pertaining to some event or activity. This paper presents an introduction of this subject and describes various technical aspects of digital evidence techniques relevant to the Windows operating system.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117120607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data mining, semantic web and advanced information technologies for fighting terrorism","authors":"S. Ahsan, A. Shah","doi":"10.1109/ISBAST.2008.4547644","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547644","url":null,"abstract":"Terrorism has emerged as an immediate and most potent threat to the free world in the post September 11, 2001 years, because of its real and potential damage to the infrastructure, economy and people. In response to this thereat, developed and developing countries, such as USA and Pakistan, have emerged as front line states in the fight against terrorism with the following objectives; i) prevent future terrorist attacks, ii) reduce the nations vulnerability, and iii) minimize the damage and recovery from attacks that occur. In order to achieve these objectives we require new approaches to intelligence and information gathering and its analysis through the use of information technology. In this paper we attempt to identify, i) the areas where IT can contribute in accomplishing these three strategic security objectives ii) the unique IT problems and challenges in counter terrorism applications where such applications are being used and developed such as in USA, and, iii) lessons learned for developing countries such as Pakistan, so that an IT counter terrorism infra structure can be established with minimum cost in terms of time and money. We have also tried to highlight the role Information Technology and Internet have to play in counter terrorism by developing and using advanced information technologies such as data mining and semantic Web. The challenges posed are discussed and initiatives to be taken are also suggested.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An image scrambling encryption using chaos-controlled Poker shuffle operation","authors":"Xiaomin Wang, Jiashu Zhang","doi":"10.1109/ISBAST.2008.4547639","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547639","url":null,"abstract":"Image scrambling is an important technique in digital image encryption and digital image watermarking. This paper presents a novel image scrambling method using Poker shuffle, which is controlled dynamically by chaotic system. Compared with other scrambling techniques such as algebraic permutations and chaotic permutations, the proposed method has properties of nonlinearity, non-analytic formula and large key space. Moreover, its scrambling performance is satisfied and can deal with non-square image. All these features show that the proposed method is more secure and efficient for image scrambling encryption.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125451734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naheed Sajjad, Dr A. K. Salma Durrani, Lala Ruhk, Mehwish Ghafoor
{"title":"Dermatoglyphic analysis of finger prints (Pattern and TRC) in mentally retarded population of Quetta, Pakistan","authors":"Naheed Sajjad, Dr A. K. Salma Durrani, Lala Ruhk, Mehwish Ghafoor","doi":"10.1109/ISBAST.2008.4547664","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547664","url":null,"abstract":"Finger printing is a multifactorial polygenic inheritance. This quantitative inheritance can be measured. This study was conducted in the population of mentally retarded section, Special School in Quetta city, Balochistan in summer 2007. Finger prints of 47 subjects were taken and studied .Same number of controls were also taken and studied. Finger print patterns as whorls, Arch, Loop, Radial Loop, Ulnar Loop and their respective Total Ridge Counts of both hands were recorded. Present studies indicated more intensity and incidence of Patterns and TRC in the mentally retarded subjects compared to the controls. Mean of total TRC were found to be 103.4 in the controls while 138 in mentally retarded individuals. Total TRC of right hand in the mentally retarded persons were slightly higher than that of left hand while it was almost the same in controls. This study was the first such observation and record in this area and can be used as the basic data which is useful for future research, biometric analysis and multi disciplinary studies.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132238173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID: Importance, privacy / security issues and implementation","authors":"R. Faruqui, E. Tayab,","doi":"10.1109/ISBAST.2008.4547668","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547668","url":null,"abstract":"RFID technology can be truly called old wine in new bottle as it is around the globe since 1940 but mainly in military domain. Lately high expectancy of users in automatic identification data collection, enormous gain and avenues offered by RFID attracted scientists, researcher and vendors to revamp this technology. Out of myriad of technologies emerging, RFID has attracted people from all walks of life. The objective of this research study is two fold; first and the foremost is to analyze this technology in depth and secondly propose its implementation in Pakistan's environment through the phase deployment of RFID systems. Cost of the equipment has not been worked out.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security model for the protection of sensitive and confidential data on mobile devices","authors":"M.T. Asghar, M. Riaz, J. Ahmad, S. Safdar","doi":"10.1109/ISBAST.2008.4547665","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547665","url":null,"abstract":"The main objective of this research is to provide security to confidential information contained in mobile devices like PDA's and laptops. Hence the model is proposed to ensure the secure authentication as well as secure access to the required information. The secure authentication is ensured by combining two previously used authentication modes in the devices, that is: password-based and biometric authentication. Furthermore, the authentication information are not stored at a single point hence provides higher security and less risk. All the authentication information is distributed over local and remote (server) nodes. Decrypting only the required files leaving the rest of files encrypted can ensure the secure access to the information using session and file management proposed in this model. The proposed model of combining both mechanisms provides better security and reliability as compared to previous systems.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134173870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of finger vein biometric for personal identification","authors":"D. Mulyono, Horng Shi Jinn","doi":"10.1109/ISBAST.2008.4547655","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547655","url":null,"abstract":"Finger vein authentication can be a leading biometric technology nowadays in terms of security and convenience, since it introduces the features inside the human body. An image of a finger captured by the web camera under the IR light transmission contains not only the vein pattern itself, but also shade produced by various thickness of the finger muscles, bones, and tissue networks surrounding the vein. In this paper, we introduce preliminary process to enhance the image quality worsened by light effect and noise produced by the web camera, then segment the vein pattern by using adaptive threshold method and matched them using improved template matching. The experimental result shows that even the image quality is not good, as long as our veins are clear and also with some appropriate process it still can be used as the means of personal identification. Hence it still can achieve up to 100% identification accuracy.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid cryptography model for managing security in dynamic topology of MANET","authors":"Maqsood Razi, J. Quamar","doi":"10.1109/ISBAST.2008.4547670","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547670","url":null,"abstract":"Despite its superiority to its conventional counterpart, modern telecommunication is beset with newer problems. For instance, MANET is riddled by issues like unreliability of wireless media, uncertain connectivity, host mobility and lack of infrastructure. However, perhaps, a most important aspect of such networks is the problem of security. The computational load and complexity involved in this environment are strongly subject to the dynamic nature of network topology, especially the restriction by the node's available resources. Therefore, key management and authentication are a central aspect for security in MANET and thus they should not be weak. For such small-scale networks, we propose here a security architecture utilizing a seniority-based trust model and PGP type certification service by building a specific PKI. Related algorithms are also presented. The performance of this new model is evaluated through simulation. The model should find wide applicability because it is simple, easy to deploy, efficient, and more secure and reliable than other existing solutions in the literature.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new kernel function to extract non linear interval type features using symbolic kernel Fisher discriminant method with application to face recognition","authors":"P. Hiremath, C. J. Prabhakar","doi":"10.1109/ISBAST.2008.4547652","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547652","url":null,"abstract":"In this paper we propose to use a new RBF kernel function to extract non linear interval type features using symbolic kernel Fisher discriminant analysis (symbolic KFD) for face recognition. The kernel based methods are a powerful paradigm; they are not favorable to deal with the challenge of large datasets of faces. We propose to scale up training task based on the interval data concept. Our investigation aims at extending kernel Fisher discriminant analysis (KFD) to interval data using new RBF kernel function. We adapt the symbolic KFD to extract interval type non linear discriminating features, which are robust due to varying facial expression, view point and illumination. In the classification phase, we employed Euclidean distance with minimum distance classifier. The new algorithm has been successfully tested using three databases, namely, ORL database, Yale Face database and Yale Face database B. The experimental results show that symbolic KFD with new RBF kernel function outperforms other discriminant analysis based algorithms.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126178268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elliptic Curve Cryptography a new way for encryption","authors":"Rahim Ali","doi":"10.1109/ISBAST.2008.4547662","DOIUrl":"https://doi.org/10.1109/ISBAST.2008.4547662","url":null,"abstract":"Upcoming technologies in the field of information security. The idea of elliptic curve cryptography (ECC), and how it's a better promise for a faster and more secure method of encryption in comparison to the current standards in the public key cryptographic algorithms of RSA. And the possibilities of making more efficient on chip implementation of the ECC and how the work is progressing in the area.","PeriodicalId":443027,"journal":{"name":"2008 International Symposium on Biometrics and Security Technologies","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116083961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}